CVE-2025-9238

7.3 HIGH

📋 TL;DR

This CVE describes an SQL injection vulnerability in Swatadru Exam-Seating-Arrangement software through commit 97335ccebf95468d92525f4255a2241d2b0b002f. Attackers can exploit the email parameter in the student.php login component to execute arbitrary SQL commands remotely. All users of affected versions are vulnerable to potential data theft, modification, or system compromise.

💻 Affected Systems

Products:
  • Swatadru Exam-Seating-Arrangement
Versions: All versions up to commit 97335ccebf95468d92525f4255a2241d2b0b002f
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: The vendor uses rolling releases, so specific version numbers are not available. All installations using the vulnerable code commit or earlier are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, or remote code execution depending on database configuration and privileges.

🟠

Likely Case

Unauthorized access to student data, exam records, and potentially administrative credentials stored in the database.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists on GitHub gist. The vulnerability is in a login component, making it accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider alternative solutions or implement workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns in the email parameter

Input Validation Filter

all

Add server-side validation to reject suspicious email parameter values containing SQL keywords

🧯 If You Can't Patch

  • Isolate the application behind a reverse proxy with strict input validation
  • Implement network segmentation to limit database access from the application server

🔍 How to Verify

Check if Vulnerable:

Test the /student.php endpoint with SQL injection payloads in the email parameter (e.g., ' OR '1'='1). Check if database errors or unexpected behavior occurs.

Check Version:

Check git commit hash: git log --oneline -1

Verify Fix Applied:

Verify that parameterized queries are implemented and SQL injection attempts return appropriate error messages without database interaction.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in email parameter logs
  • Database error messages in application logs
  • Multiple failed login attempts with SQL patterns

Network Indicators:

  • HTTP requests to /student.php containing SQL keywords in parameters
  • Unusual database query patterns from application server

SIEM Query:

source="web_logs" AND uri_path="/student.php" AND (email="*OR*" OR email="*UNION*" OR email="*SELECT*" OR email="*INSERT*")

🔗 References

📤 Share & Export